Cloud Computing Series: Products to Build A

Total Page:16

File Type:pdf, Size:1020Kb

Cloud Computing Series: Products to Build A Systems Engineering at MITRE CLOUD COMPUTING SERIES Products to Build a Private Cloud Lawrence Pizette Geoffrey Raines July 2010 Executive Summary “With today’s virtual infrastructure solutions and a Federal information technology (IT) leaders who are growing list of internal cloud platform technologies, seeking to leverage cloud computing concepts while it’s fairly easy for an enterprise to start up a cloud- maintaining full control and ownership of their IT like environment within its own domain.” capability may elect to implement a private cloud computing environment. A private cloud capability – James Staten et al., Deliver Cloud Benefits Inside Your Walls, Forrester Research, April 13, 2009 can offer increased security and provide the flex- ibility to implement unique requirements along with the benefits and attributes of ownership, including that they list are on-demand self-service, broad net- data rights and control over the system. Some of work access, resource pooling (e.g., multi-tenancy), the benefits of using a private cloud approach over rapid elasticity (e.g., rapid scaling), and measured traditional IT are: it allows for better utilization of service. As aspects of these characteristics are pres- hardware, the ability to easily provide continuity of ent in other IT approaches, it is the combination that operations (COOP), the ability to quickly provision describes cloud computing. capabilities, and the ability to provide location inde- pendent access. Organizations that pursue develop- Categories of Infrastructure for a Private Cloud— ment of a private cloud infrastructure are investing The product categories listed below were selected their own capital with commensurate development based upon a generalization of the private cloud schedules, risks, and operating costs. They are trad- computing marketplace and available technologies. ing off the attributes of a private cloud for a differ- However, industry innovation is not constrained to ent set of benefits and risks that they might attain if neat categories; some vendors are offering suites of they chose a different cloud computing deployment capabilities that span multiple categories. model. In order to help these leaders to understand the private cloud computing products available in • Virtualization technology provides the hypervi- early 2010 and how they may fit into their data cen- sor software, which allows multiple instances of ters, this paper surveys the private cloud computing “guest” operating systems to run concurrently on market. the same physical server. This capability enables “multi-tenancy,” which is the sharing of physical While the benefits of a private cloud may be numer- resources providing for better server utilization. ous, shared community or public cloud offerings The improved server utilization can reduce heat- may be available sooner at lower costs, but will likely ing, ventilation, and air conditioning (HVAC) offer a different set of attributes for mission assur- and electric costs, data center, size and other ance and other important characteristics. related infrastructure costs. It also can allow advanced users or data center operators to provi- Attributes of Cloud—While there is no single sion capabilities quickly, facilitating scalability, agreed upon definition for cloud computing, the self-service provisioning, and COOP. National Institute for Standards and Technology • Storage technology, such as disk arrays, storage (NIST) has listed several essential characteristics of a area networks (SANs), and storage connection private cloud approach.1 The essential characteristics Executive Summary—Products to Build a Private Cloud i technologies can provide the underlying persis- employed that considers the Federal IT leader’s tent storage for a private cloud. The market for high-level objectives and specific requirements. these types of systems is huge: In Q4 2009, the While some private clouds may be driven by worldwide external disk systems market was the desire to reduce costs, others may be driven $5.288 billion with the top five vendors, EMC, primarily by new capabilities that can be pro- IBM, HP, NetApp, and Dell taking 69 percent of vided. Additionally, there can be many specific the market share.2 Regardless of which vendor requirements in a private cloud such as perfor- provides it, storage is essential to a private cloud mance, self-service provisioning, COOP, location as it can enable burst capacity and provide capa- independent access, and robust security, which bilities to facilitate COOP and location indepen- need to be considered carefully before acquiring dent access. specific hardware and software products. • Security capabilities for a private cloud are • Security should be considered from the begin- essential. Products offered to the private cloud ning of the structured systems engineering computing market provide capabilities such process. Security architects should perform an as identity management, logging and audit- analysis and consider a pilot to understand new ing, anti-malware software, intrusion detection threats and mitigating strategies. The analysis systems (IDS) and intrusion prevention systems should consider how private cloud capabilities (IPS), and firewall capabilities between virtual would be integrated into the rest of the data machines. While there are many products on center’s environment (e.g., identity management the market, addressing security concerns within systems). multi-tenant, cloud computing environments is • A private cloud will require updated management an active area for research for many organiza- and governance. For example, if virtual environ- tions. Therefore, products will continue to evolve ments are not managed, the absence of controls as more knowledge is learned about threats and coupled with the relative ease of creating virtual measures to mitigate them. machines can result in a proliferation of environ- • Provisioning, management, and metering tools ments and a condition informally known as “VM are key to providing Federal IT leaders and users sprawl.” This condition can offset anticipated with many of the advantages a private cloud can efficiency gains and allow for security exposures offer: self-service provisioning, burst capability, due to unmaintained environments. In order to service-level agreement (SLA) compliance, and, if mitigate the risk, piloting and testing of the inte- needed, metering for “pay as you go” functional- grated environment should be considered as part ity. Tools in this category provide the ability to of the overall systems engineering plan. monitor server utilization, system resources, and A private cloud implementation can offer signifi- other operational attributes. The ability to provi- cant benefit to Federal organizations seeking to sion environments on-demand, independent of realize some of the benefits of cloud computing the underlying hardware enables the ability to while maximizing control over their environment. scale environments in near real time and, if nec- Recognizing that the benefits coupled with control essary, to instantiate environments in a different can be compelling for many Government organi- location. zations, industry has provided a wide selection of Considerations— products for realizing the vision. This paper pro- • When developing a private cloud, a compre- vides insight into example products and consider- hensive systems engineering process should be ations for their use. ii Cloud Computing Table of Contents 1.0 Introduction to Products to Build a Private Cloud 1 2.0 Virtualization and Hypervisors 2 3.0 Storage Solutions 4 4.0 Security Products 6 5.0 Provisioning, Management, and Metering 8 Appendix A—Products Mentioned 11 References 12 THE BIG PICTURE: A private cloud computing environment can offer a path forward for Federal IT leaders seeking to realize some of the benefits of cloud computing while maximizing control over their environment. Lawrence Pizette Products to Build a Private Cloud Geoffrey Raines 1.0 Introduction to Private Clouds “Companies that want the benefits of cloud computing Summary—For Federal information technology services without the risks are looking to create cloud-like (IT) leaders considering employing a private cloud environments in their own data centers. To do it, they’ll approach, this paper provides a window into prod- need to add a layer of new technologies—virtualization ucts that are available from the commercial mar- ketplace. The paper is organized into the general management, cloud APIs, self-service portals, categories of virtualization and hypervisors, storage chargeback systems, and more— (e.g., storage area networks, storage arrays), security, to existing data center systems and processes.” and provisioning, management, and metering. The – Charles Babcock, Information Week, April 11, 2009 product categories in this paper were selected based upon a generalization of the private cloud computing marketplace and the technologies available in early computing: private, community, public, and hybrid.3 2010. However, vendor products do not always fall According to the NIST definition: directly within one category; some vendors are offer- ing suites of capabilities that span multiple categories • Private clouds are “operated solely for an and other vendors are offering appliances, some of organization.” which package both hardware and software into “a • Community cloud “infrastructure is shared by cloud in a box.” Similarly, other vendors are offering several organizations
Recommended publications
  • PCI DSS Virtualization Guidelines
    Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: June 2011 Author: Virtualization Special Interest Group PCI Security Standards Council Information Supplement: PCI DSS Virtualization Guidelines Information Supplement • PCI DSS Virtualization Guidelines • June 2011 Table of Contents 1 Introduction ....................................................................................................................... 3 1.1 Audience ................................................................................................................ 3 1.2 Intended Use .......................................................................................................... 4 2 Virtualization Overview .................................................................................................... 5 2.1 Virtualization Concepts and Classes ..................................................................... 5 2.2 Virtual System Components and Scoping Guidance ............................................. 7 3 Risks for Virtualized Environments .............................................................................. 10 3.1 Vulnerabilities in the Physical Environment Apply in a Virtual Environment ....... 10 3.2 Hypervisor Creates New Attack Surface ............................................................. 10 3.3 Increased Complexity of Virtualized Systems and Networks .............................. 11 3.4 More Than One Function per Physical System ................................................... 11 3.5 Mixing VMs of
    [Show full text]
  • NVM Express and the PCI Express* SSD Revolution SSDS003
    NVM Express and the PCI Express* SSD Revolution Danny Cobb, CTO Flash Memory Business Unit, EMC Amber Huffman, Sr. Principal Engineer, Intel SSDS003 Agenda • NVM Express (NVMe) Overview • New NVMe Features in Enterprise & Client • Driver Ecosystem for NVMe • NVMe Interoperability and Plugfest Plans • EMC’s Perspective: NVMe Use Cases and Proof Points The PDF for this Session presentation is available from our Technical Session Catalog at the end of the day at: intel.com/go/idfsessions URL is on top of Session Agenda Pages in Pocket Guide 2 Agenda • NVM Express (NVMe) Overview • New NVMe Features in Enterprise & Client • Driver Ecosystem for NVMe • NVMe Interoperability and Plugfest Plans • EMC’s Perspective: NVMe Use Cases and Proof Points 3 NVM Express (NVMe) Overview • NVM Express is a scalable host controller interface designed for Enterprise and client systems that use PCI Express* SSDs • NVMe was developed by industry consortium of 80+ members and is directed by a 13-company Promoter Group • NVMe 1.0 was published March 1, 2011 • Product introductions later this year, first in Enterprise 4 Technical Basics • The focus of the effort is efficiency, scalability and performance – All parameters for 4KB command in single 64B DMA fetch – Supports deep queues (64K commands per Q, up to 64K queues) – Supports MSI-X and interrupt steering – Streamlined command set optimized for NVM (6 I/O commands) – Enterprise: Support for end-to-end data protection (i.e., DIF/DIX) – NVM technology agnostic 5 NVMe = NVM Express NVMe Command Execution 7 1
    [Show full text]
  • Renewing Our Energy Future
    Renewing Our Energy Future September 1995 OTA-ETI-614 GPO stock #052-003-01427-1 Recommended Citation: U.S. Congress, Office of Technology Assessment, Renewing Our Energy Fulture,OTA-ETI-614 (Washington, DC: U.S. Government Printing Office, September 1995). For sale by the U.S. Government Printing Office Superintendent of Documents, Mail Stop: SSOP, Washington, DC 20402-9328 ISBN 0-16 -048237-2 Foreword arious forms of renewable energy could become important con- tributors to the U.S. energy system early in the next century. If that happens, the United States will enjoy major economic, envi- ronmental, and national security benefits. However, expediting progress will require expanding research, development, and commer- cialization programs. If budget constraints mandate cuts in programs for renewable energy, some progress can still be made if efforts are focused on the most productive areas. This study evaluates the potential for cost-effective renewable energy in the coming decades and the actions that have to be taken to achieve the potential. Some applications, especially wind and bioenergy, are already competitive with conventional technologies. Others, such as photovol- taics, have great promise, but will require significant research and devel- opment to achieve cost-competitiveness. Implementing renewable energy will be also require attention to a variety of factors that inhibit potential users. This study was requested by the House Committee on Science and its Subcommittee on Energy and Environment; Senator Charles E. Grass- ley; two Subcommittees of the House Committee on Agriculture—De- partment Operations, Nutrition and Foreign Agriculture and Resource Conservation, Research and Forestry; and the House Subcommittee on Energy and Environment of the Committee on Appropriations.
    [Show full text]
  • Vgw Virtual Gateway Virtual Gateway Virtual
    vGW Virtual Gateway Administration Guide Release 4.5 Service Pack 1 Copyright © 2011, Juniper Networks, Inc Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. SOFTWARE LICENSE The terms and conditions for using this software are described in the software license contained in the acknowledgment to your purchase order or, to the extent applicable, to any reseller agreement or end-user purchase agreement executed between you and Juniper Networks. By using this software, you indicate that you understand and agree to be bound by those terms and conditions.
    [Show full text]
  • Secure Data Center Networking with Open Vswitch
    Secure Data Center Networking with Open vSwitch Pa Pa Hlaing University of Computer Studies, Yangon [email protected] Abstract agility and isolation of VMs. Most physical switches deployed in conventional DCNs are not designed for either supporting such unique VM Data centers have become the next- requirements or flexible enough to augment new generation computing platforms for enterprises functionalities [7]. At the same time, VM and Internet users. This is primarily due to the networking has inherently unique characteristics, economic and technical advantages of resource such as the awareness of the migration of VMs sharing in data centers. By sharing computing and their multicast membership. Therefore, much and storage resources through services such as research has begun exploring the opportunity to cloud computing or software-as-a-service (SaaS), introduce a new, flexible and programmable users can amortize the cost of hardware and networking layer based on the knowledge of software. Because of the virtualization of VMs. resources, a new virtualized network access layer Modern data center networks consist of both has been introduced to interconnect VMs within physical networks connected by switches and the data centers. In data center, hosts have been virtual networks formed by VMs running inside recently employed virtual switch to interconnect physical hosts. Inside one computer, many VMs virtual machines (VMs) within data center can exist (as many as 120 VMs per host), each of networks. Virtual Switch is essential to control which has at least one virtual network interface and manage VM within the hosts. Open vSwitch, card (VNIC). The VNICs communicate with a network switch specifically built for Xen external networks through the host’s physical virtualization environment is presented.
    [Show full text]
  • S32 - a Primer on Virtualization Tom Ray
    S32 - A Primer on Virtualization Tom Ray A Primer on Virtualization Ignoring the man behind the curtain? Agenda • Top 3 things you need to know about Virtualization when you Audit it, & your IT & IT security groups. – What IS virtualization? – What are the issues? – What is a reasonable, “AUDIT-READY” secure Reference Architecture? • Discuss how to Audit a virtualized IT 2 1 What is Virtualization? 3 Some Observations • It is NOT new (but some developments are) • It is an “already expected ” cost containment technology in many IT departments • Before you can answer “what is” you need to identify which kind you are interested in • It is jargon and acronym-rich, & it’s vendor balkanized • It is (still) immature and so nothing does it full justice – no one approach, no set of standards, or vendor, or architecture, or set of components, or framework, or technology, or technique, or regulations, etc. • It will radically impact how you “do” IT & environments 4 2 What are the Issues? 5 In Summary 1. Disconnect between Logical and Physical is exploited for the technology’s benefit; not the humans’ 2. Dynamism 3. Blur & Ease of Sprawl – Increased Complexity & Interdependencies – Overlap of various roles’ capabilities 4. Resource equation is still a zero-sum game (at best) – Same staff (IT & Business) – Same Procedures? , … same Tools? 5. The technology’s Immaturity 6. Our IT Operations Immaturity 7. The CIO’s Drivers (expectations, motivations & intentions) 6 3 What is a reasonable, “AUDIT‐READY” secure Reference Architecture? 7 2 Security Reference Architectures Durable Non Compliance People / Organizations X Processes / Tasks / RnR Metrics? Threat Technologies / Constructs X Mitigation Build Specs / Contracts / Metrics? Documentation Technical-Trust Enablement 1.
    [Show full text]
  • Intel® Optane™ Storage Performance and Implications on Testing Methodology October 27, 2017 Version 1.0
    Intel® Optane™ Storage Performance and Implications on Testing Methodology October 27, 2017 Version 1.0 Executive Summary Since the unveiling in 2015, 3D XPoint™ Memory has shown itself to be the disruptive storage technology of the decade. Branded as Intel® Optane™ when packaged together with Intel’s storage controller and software, this new transistor-less solid-state ‘storage class memory’ technology promises lower latencies and increased system responsiveness previously unattainable from a non-volatile memory product. When coupled with NVMe and ever faster interfaces, Intel® Optane™ seeks to bridge the gap between slower storage and faster system RAM. Intel® Optane™ and 3D XPoint™ Technology 3D XPoint™ represents a radical departure from conventional non-volatile memory technologies. NAND flash memory stores bits by trapping an electrical charge within an insulated cell. Efficient use of die space mandates that programming be done by page and erasures by block. These limitations lead to a phenomenon called write amplification, where an SSD must manipulate relatively large chunks of data to achieve a given small random write operation, negatively impacting both performance and endurance. 3D XPoint™ is free of the block erase, page, and write amplification limitations inherent with NAND flash and can be in-place overwritten at the bit/byte/word level with no need for over- provisioning to maintain high random performance and consistency. 3D XPoint™ data access is more akin to that of RAM, and thanks to the significant reduction in write-related overhead compared to NAND, read responsiveness can be maintained even in the face of increased system write pressure. A deeper dive of how 3D XPoint™ Memory works is beyond the scope of this paper but can be found elsewhere on the web.
    [Show full text]
  • Intel SSD 750 Series Evaluation Guide
    Intel® Solid State Drive 750 Series Evaluation Guide September 2016 Order Number: 332075-002US Intel® Solid State Drive 750 Series Ordering Information Contact your local Intel sales representative for ordering information. Tests document performance of components on a particular test, in specific systems. Differences in hardware, software, or configuration will affect actual performance. Consult other sources of information to evaluate performance as you consider your purchase. Results have been estimated based on internal Intel analysis and are provided for informational purposes only. Any difference in system hardware or software design or configuration may affect actual performance. All documented performance test results are obtained in compliance with JESD218 Standards; refer to individual sub-sections within this document for specific methodologies. See www.jedec.org for detailed definitions of JESD218 Standards. Intel does not control or audit the design or implementation of third party benchmark data or Web sites referenced in this document. Intel encourages all of its customers to visit the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate and reflect performance of systems available for purchase. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others.
    [Show full text]
  • Juniper Networks Inc
    JUNIPER NETWORKS INC FORM 10-K (Annual Report) Filed 02/26/13 for the Period Ending 12/31/12 Address 1194 NORTH MATHILDA AVE SUNNYVALE, CA 94089 Telephone 4087452000 CIK 0001043604 Symbol JNPR SIC Code 3576 - Computer Communications Equipment Industry Communications Equipment Sector Technology Fiscal Year 12/31 http://www.edgar-online.com © Copyright 2013, EDGAR Online, Inc. All Rights Reserved. Distribution and use of this document restricted under EDGAR Online, Inc. Terms of Use. Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2012 OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from__________ to____________ Commission file number 001-34501 JUNIPER NETWORKS, INC. (Exact name of registrant as specified in its charter) Delaware 77-0422528 (State or other jurisdiction of incorporation or organization) (IRS Employer Identification No.) 1194 North Mathilda Avenue Sunnyvale, California 94089 (408) 745-2000 (Address of principal executive offices)(Zip Code) ( Registrant's telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Title of Each Class Name of Each Exchange on Which Registered Common Stock, par value $0.00001 per share New York Stock Exchange Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.
    [Show full text]
  • Juniper Networks Inc
    JUNIPER NETWORKS INC FORM 10-K (Annual Report) Filed 02/26/14 for the Period Ending 12/31/13 Address 1194 NORTH MATHILDA AVE SUNNYVALE, CA 94089 Telephone 4087452000 CIK 0001043604 Symbol JNPR SIC Code 3576 - Computer Communications Equipment Industry Communications Equipment Sector Technology Fiscal Year 12/31 http://www.edgar-online.com © Copyright 2014, EDGAR Online, Inc. All Rights Reserved. Distribution and use of this document restricted under EDGAR Online, Inc. Terms of Use. UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2013 or TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from__________ to____________ Commission file number 001-34501 JUNIPER NETWORKS, INC. (Exact name of registrant as specified in its charter) Delaware 77-0422528 (State or other jurisdiction of incorporation or organization) (I.R.S. Employer Identification No.) 1194 North Mathilda Avenue Sunnyvale, California 94089 (Address of principal executive offices) (Zip code) (408) 745-2000 (Registrant's telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Title of Each Class Name of Each Exchange on Which Registered Common Stock, par value $0.00001 per share New York Stock Exchange Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.
    [Show full text]
  • X-Series Hyperconverged Nodes Powered by Acuity 2.3 Setup & User Guide
    X-Series Hyperconverged Nodes Powered by Acuity 2.3 Setup & User Guide Document Version 1.0 January 15, 2018 X-Series Hyperconverged Nodes Powered by Acuity Setup & User Guide, v1.0 Purpose This edition applies to Pivot3’s X-Series Hyperconverged Nodes powered by the Acuity software platform (Version 2.3.1 and above) and to any subsequent releases until otherwise indicated in new editions. Specific documentation on other Pivot3 offerings are available in the Pivot3 documentation repository. This document contains information proprietary to Pivot3, Inc. and shall not be reproduced or transferred to other documents or used for any purpose other than that for which it was obtained without the express written consent of Pivot3, Inc. How to Contact Pivot3 Pivot3, Inc. General Information: [email protected] 221 West 6th St., Suite 750 Sales: [email protected] Austin, TX 78701 Tech Support: [email protected] Tel: +1 512-807-2666 Website: www.pivot3.com Fax: +1 512-807-2669 Online Support: support.pivot3.com About This Guide This document provides procedures for: • Connecting X-Series Hyperconverged Nodes powered by Acuity to the VMware and ESXi management networks • Combining nodes to create an Acuity vPG This guide is written for Service Engineers and System Administrators configuring a Pivot3 X-Series Solution. The Pivot3 nodes should be set up as described in the appropriate hardware setup guide, and the procedures in this document require an understanding of the following: • The operating systems installed on the application servers connected to the Acuity vPG • Communication protocols installed on local application servers • vSphere Client for access to VMware ESXi hosts or vCenter © Copyright 2018 Pivot3, Inc.
    [Show full text]
  • HP Arcsight Smartconnector Supported Products Data Sheet
    Data sheet HP ArcSight SmartConnector supported products The HP ArcSight library of out-of-the-box SmartConnectors provides source-optimized collection for leading security commercial products. These products span the entire stack of event-generating source types, from network and security devices to databases and enterprise applications. SmartConnectors are the default listing in this document. In addition to SmartConnectors developed and maintained by HP ArcSight, we test and certify the following connector types through our Technology Alliances Program: • Common event format (CEF) Certified—helps ensure event information is captured properly in the CEF • Action Certified—allows for control of a vendor’s technology from within the HP ArcSight Console Common event format are in bold below and Action are Italicized. If they have both they are bold and Italicized. HP ArcSight SmartConnector supported Application security platform for installation • Arxan GuardIT • CentOS-6.5, 6.6, and 7.0 • Bit9 + Carbon Black Security Platform • Microsoft® Windows Server® 2008 • CA Layer 7 SecureSpan/CloudSpan SP2 32/64-bit Gateway • Microsoft Windows Server 2008 • Intralinks VIA R2 SP1 64-bit • McAfee Application Control (Solidcore) • Microsoft Windows Server 2012 • RSA Silver Tail Systems Forensics Standard 64-bit, R2 64-bit • Red Hat® Enterprise Linux® (RHEL) Clinical/Healthcare applications 6.4 64-bit • FairWarning • SUSE Linux 11 Enterprise Server 64-bit • Oracle Solaris 10 64-bit, 11 32-bit Cloud • IBM AIX version 7.1 64-bit • Box • CloudPassage
    [Show full text]